Subhalakshmi discusses the most common misconceptions about network security, that often cloud an organisation's judgment when it comes to protecting their IT assets.
Julia Bishop discusses a recent report on the risk posed by APT10 and actions companies should take to respond to such threats if they use managed IT service providers.
New Government statistics have revealed that in the last 12 months, half of UK businesses have suffered a cyber-security breach.
According to new research by eSentire, cyber-criminals are moving away from sophisticated attacks in favour of inexpensive and automated methods of intrusions.
McAfee catalogues 176 new cyber-threats every minute, almost three every second; ransomware up 88 percent, mobile malware up 99 percent in 2016.
Sixty-one percent of organisations polled in a survey from CyberEdge Group responded that they'd been hit by a ransomware demand, a third of those paid the ransom demand.
A version of the social media mobile app Facebook Lite, most likely available via third-party sites in China, was found infected with malware that can steal personal information, Malwarebytes reported on Monday.
A newly discovered Mac malware with some very old coding has likely been targeting biomedical research facilities for at least two years without detection.
A newly discovered Android trojan can sabotage entire Wi-Fi networks and the users who connect to them by accessing the router that an infected device is communicating with and executing a Domain Name System hijack attack.
Marcell Gogan discusses the threat of privileged user access and how it often goes largely ignored
Annette Murphy explores how security professionals can prepare and protect their assets from Distributed Denial of Service (DDoS) attacks
Nearly half of UK organisations (47 percent) feel they have insufficient skills in-house to deal with the current cyber-threat landscape.
Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.
Brazil has emerged as a primary centre of financially motivated e-crime threat activity.
Josh Corman, founder of I Am the Cavalry, spoke at IP EXPO Europe 2016 and pointed the finger at the software supply chain to tackle cyber-threats, arguing that we need fewer and better suppliers.
As data breaches become commonplace and organisations struggle to keep pace, Treavor Dearing explains why integration and collaboration among IT security vendors is emerging as the only viable solution to beat cyber-criminals once and for all.
The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.
A majority of mobile users (89 percent) wouldn't know if their device has been infected through a cyber-attack, revealing a massive lack of awareness of cyber-threats.
An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.
Bloggers using the WordPress platform are "strongly encouraged" to update their sites immediately to address persistent XSS issues.
Eight brands of IoT home routers were compromised and used to create botnets that launched an application-level DDoS attack against a website's multiple servers.
DDoS attacks have increased in frequency, scale and complexity over the past year, driven by DDoS-for-hire services.
US Senators asked Ted Cruz (R-TX) to hold a hearing that examines Donald Trump's Russia comments entreating Russia to "find the 30,000 emails that are missing."
A robust underground marketplace for the sale of stolen products from compromised accounts as well as shady online services has been detected in Russia.
François Amigorena explains why compromised credentials are a major cyber-threat to organisations and how cumbersome security wastes time, whereas contextual awareness allows greater security automatically.
An Israel-based security firm has issued a warning to fans of the upcoming Olympics to be wary of phony offers.
A cyber-scam has been unfolding in the wake of the Brexit vote.
Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.
Conficker maintains its rank as the most common malware family, according to Check Point's May 2016 Threat Index.
Hackers used login information to launch a "sophisticated password attack" to login to Citrix's GoToMyPC user accounts, according to a company blog post.